• Home
  • Search
  • Browse Collections
  • My Account
  • About
  • DC Network Digital Commons Network™
Skip to main content
  • Home
  • About
  • FAQ
  • My Account
Beadle Scholar Dakota State University
  • Collections
  • Publications
  • Student Research

    Content Posted in 2025

    PDF

    Acting Quickly: Determining Urgency in Phishing Messages, Patrick Rau

    PDF

    Addressing Physical Space Needs of Neurodivergent Students, Mary Francis

    PDF

    A Deep Learning Approach to Vulnerability Detection in Lifted Code Using Transformer-Based Embeddings, Gary McCully

    PDF

    Advancing DevSecOps in SMEs: Challenges and Best Practices for Secure CI/CD Pipelines, Jayaprakashreddy Cheenepalli, John Hastings, Khandaker Mamun Ahmed, and Chad Fenner

     

    AI Super Resolution for Structural Damage Detection From Low Quality Sources, Catherine Hoier and Khandaker Mamun Ahmed

    PDF

    A Mixed Methods Comparative Analysis of Organizational Incident Response to SolarWinds and Log4Shell, Matthew Ryan

    PDF

    Analyzing American Voters’ Positive and Negative Responses to AI-Generated Political Advertisements, Grace Schofield

    PDF

    Analyzing the Effectiveness of Information Security Compliance on Cloud Based Small and Medium Enterprises (SMEs), Kasie Kelvin Awagu

    PDF

    An Exploration of Machine Learning Security, Carson Kendall Grandi Koball

    PDF

    Aphanomyces root rot of alfalfa disease survey in Eastern South Dakota establishes widespread pathogen distribution, Jennifer M. Giles, Conner L. Tordsen, and Andrew E. Sathoff

    PDF

    A Risk Evaluation Framework and Comprehensive Security Compliance Assessment Solution for Space Information Networks (SIN), Bernard Afaare Dawaare

    PDF

    Assessing Commercial Biological Control Agents for Activity Against Alfalfa Root Rotting Pathogens, Travis R. Rebstock, Conner L. Tordsen, Brandon Daniels, Oleksandra Rachynska, and Andrew E. Sathoff

    PDF

    Assessing Commercial Biological Control Agents for Activity Against South Dakota Alfalfa Pathogens, Conner L. Tordsen and Andrew E. Sathoff

    PDF

    Assessing Security Flaws in Modern On-Board Precision Farming Systems, Joseph Boyd

    PDF

    A Survey-Based Quantitative Analysis of Stress Factors and Their Impacts Among Cybersecurity Professionals, Sunil Arora and John D. Hastings

    PDF

    A Survey of Unikernel Security: Insights and Trends from a Quantitative Analysis, Alex Wollman and John Hastings

    PDF

    A Teacher Apprenticeship Pathway in a Rural, Midwest State: Perspectives of Teacher Apprentices, Megan Schuh, Jennifer Nash, David DeJong, and Ryan Young

    PDF

    A Teacher Apprenticeship Pathway in a Rural, Midwest State: Perspectives of Teacher Apprentices, Megan Schuh, Jennifer Nash, Ryan Young, and David De Jong

    PDF

    Automatic Heap Primitive Detection for Exploit Development, Rachel Glockenmeier

    PDF

    Automating Mobile Malware Evasion: An Opcode N-Gram Based Approach to Generate Machine Learning Powered Adversarial Examples, Kenji Harada

    PDF

    Automobile Autonomy vs the Social Impact of Human Trust, Robert J. Goscicki II

    PDF

    Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code, Gary McCully, John Hastings, Shengjie Xu, and Adam Fortier

    PDF

    Bones et. al: Educational Human Skeletons Restoration and Investigation, Emelye Josko and Andrew E. Sathoff

    PDF

    Bone Surface Modification Dataset Synthesis for Computer Vision Models Using LoRA Tuned Latent Diffusion Models, Jason Mixon

    PDF

    Bridging Cognitive Psychology and Natural Language Processing: A Bias-Detection Framework for Large Language Models, Stephen Surles

    PDF

    CEKER: A Generalizable LLM Framework for Literature Analysis with a Case Study in Unikernel Security, Alex Wollman and John Hastings

    PDF

    CGFuzzerArt: A Directed Graybox Fuzzer for Vulnerability Discovery, Zishan Merza

    PDF

    China’s Rise in the Global AI Sector, Olivia Armstrong

    PDF

    China vs Democracy: The Strategic Use of Cyber Influence Campaigns, Alexander Deak

    PDF

    China vs Democracy: The Strategic Use of Malign Cyber Influence Campaigns, Alexander Deak

    PDF

    Collectivism, Individualism, and Cyber Crime: An Evaluation of the United States, the Netherlands, China, and Pakistan, Rook Wiese

    PDF

    Comparative Analysis of Forensic Tool Testing Frameworks to Use With Mobile Forensic Tools, Gillian Morris

    PDF

    Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code, Gary McCully, John Hastings, Shengjie Xu, and Adam Fortier

    PDF

    Confronting the Reproducibility Crisis: A Case Study of Challenges in Cybersecurity AI, Richard H. Moulton, Gary A. McCully, and John D. Hastings

    PDF

    Convolutional Autoencoder Neural Network Design Evaluation for an Anomaly Detection Subsystem in Autonomous Spacecraft Computer Vision Systems, Jonathan F. Lancelot

    PDF

    Differential Privacy for Microdata Streams: Adversarial Approaches, Sean McElroy

     

    Does the Use of Audits Decrease the Infection Rate in a Medical Care Setting?, Kylie Borchert and Kristel K. Bakker

    PDF

    Do Online Proctoring Software Abide by Standard Data Protections?, Tristan Stapert

    PDF

    Employee and Employer Perceptions Regarding Cybersecurity Education During The Hiring Process, Jordan VanHoy

     

    Enhancing Crop Yield through Efficient Anomaly Detection Using Transfer Learning and Multispectral Satellite Imagery, Muhammad Bhutta, Khandaker Mamun Ahmed, Abid Mehmood, Youssef Harrath, and Jihene Kaabi Dr.

    PDF

    Ethanol Concentration in Gasoline, Hannah Feser, Wyatt Olson, and Jeffrey Elbert

    PDF

    Evaluating SMS Spam Classification: Human Judgement vs Machine Learning Models, Gabe Miller

    PDF

    Experiential Learning Through Simulations in Fully Online Asynchronous Courses: Exploring the role of self-debriefing, David De Jong and Sara Dexter

    PDF

    Exploring an AI Chatbot to Close School Counselor Information Gaps: A Design Science Approach, Kalee Crandall

    PDF

    Factors Influencing Blockchain Implementation in Supply Chain Management: An Exploratory Study, Aravindh Sekar

    PDF

    FAIDS: artificial intelligence developmental systems framework for predicting and preventing cyberattacks in supply chain networks, Lordt Becklines

    Link

    Fine Grained Address Space Layout Randomization Using Noncontiguous Per-Function Memory Segment Assignment, Andrew Kramer

    PDF

    Flying through the air with the greatest of ease? Evaluation of glide capability in basal maniraptoran theropods, Norah Zoller, Kierra Miller, Michael B. Habib, Hans C. Larsson, and T. Alexander Deccechi

    PDF

    Functional analysis of differentially expressed genes in alfalfa (Medicago sativa) inoculated with Aphanomyces euteiches race 1 and race 2, Jay Alexander, Deborah A. Samac, and Andrew E. Sathoff

    PDF

    Generative AI for Synthetic Data Creation: Building Mastery-Focused Educational Datasets, Tapiwa Amion Chinodakufa and Khandaker Mamun Ahmed

    PDF

    How Technology Can Be Used to Reduce the Equity Gap in Healthcare for Underserved Communities, Richard Manprisio

    PDF

    Identification and Characterization of Pythium Species Isolated From Commercial Alfalfa Fields in South Dakota, Oleksandra Rachynska, Travis R. Rebstock, Conner L. Tordsen, Jennifer M. Giles, and Andrew E. Sathoff

     

    If You Have Nothing to Hide, You Still Have Something to Fear: How Libraries Can Support Alternative Information Channels, Abbie Steuhm

    PDF

    Impact of Data Characteristics on the effectiveness of multi-stage transfer learning using MRI medical images, Ganga Prasad Basyal

    PDF

    Impact of Data Snooping on Deep Learning Models for Locating Vulnerabilities in Lifted Code, Gary McCully, John Hastings, and Shengjie Xu

    PDF

    Impact of Organizational Changes on BI Critical Success Factors, Badr Harfoush

    PDF

    Improving Survey Methods to Better Detect Rare Grassland Birds in South Dakota, Kassy Hendricks, Kristel K. Bakker, and Chuck Dieter

    PDF

    In Defense of Artificial Intelligence, Darrin Dutcher

    Link

    In Response to Your Recent Article: How Letters to the Editor Challenge Historical Narratives, Abbie Steuhm

    PDF

    Investigating the energetics and feeding ecology of a range of Azhdarchid Pterosaurs, Kierra Miller and T. Alexander Deccechi

    PDF

    Is Al-Driven threat detection an effective substitute for current threat detection architectures?, Connor J. Ford

    PDF

    Isolation and Characterization of Pythium spp. from South Dakota soils under commerical alfalfa production, Jennifer M. Giles and Andrew E. Sathoff

    PDF

    Machine Learning and SHAP Interpretability for Chronic Disease Understanding, Nnaemeka Charles Igwe

    PDF

    Malware Classification Using Weighted Control Flow Graphs, Tjada Nelson

    PDF

    Managing South Dakota Alfalfa Diseases with Commercial Biological Control Agents, Travis R. Rebstock, Conner L. Tordsen, Brandon Daniels, Oleksandra Rachynska, and Andrew E. Sathoff

    PDF

    Measuring the Effectiveness of AppLocker Against Banking Trojans (A Multi-year Study), Robert Riskin

    PDF

    Microsegmented Cloud Network Architecture Using Open-Source Tools for a Zero Trust Foundation, Sunil Arora and John Hastings

    PDF

    Mirage: A VBA Macro Emulator for Behavioral Analysis Powered by Machine Learning, Corey Mathew Hartman

     

    Natural Bone Human Education Skeletons: Investigating Restoration and Ancestry, Emelye Josko

    PDF

    Natural Language Processing Applications in Medical Data, Sureh San and Mark Spanier

    PDF

    Natural Language Processing in Lakhota, Jackson Ruedebusch

    PDF

    Natural LanguageProcessing,UnderstandingSlang and ColloquialSpeech, Beau Miller

    Link

    Navigating intent-based networking: from user descriptions to deployable configurations, Ala’ A. AlSamarneh, Ahmad T. Al-Hammouri, and Omar Y. Al-Jarrah

    Link

    NIT: a Dataset for Network Intent Translation, Ala’ A. AlSamarneh, Omar Y. Al-Jarrah, and Ahmad T. Al-Hammouri

    PDF

    Open-Source Software Development: Mass Spectrometry Data Management Program Prototype, Sophia I. Lewis

    PDF

    Optimal Algorithm for Managing On-Campus Student Transportation, Youssef Harrath, Jood AlYusuf, Zeena Ghulam, and Muna AlDoseri

    PDF

    Performance Measurement of BGP Extended with De-Facto Network Identification, Shawn Zwach

    PDF

    Prescriptive Zero Trust: Assessing the Impact of Zero Trust on Cyber Attack Prevention, Samuel T. Aiello

    PDF

    Principles For the Design of Visual Progress Bars to Improve Motivation in Online Learning, Tania Shotts Williams

    PDF

    Pure Nash Equilibrium and Strong Nash Equilibrium Computation in Additive Aggregate Games, Jared Soundy, Mohammad T. Irfan, and Hau Chan

    PDF

    Quantifying Dynamic Response in Web Application Honeypots, Luke Constantino

    PDF

    Quantifying Return on Controls in LLM Cybersecurity, Richard Helder Moulton

    PDF

    Quantifying the Effectiveness of Dynamic Response in Web Application Honeypots, Luke Constantino

    PDF

    Quantitative Real-Time PCR Identification of Soybean Pathogens in Eastern South Dakota Soil, Brandon Daniels, Oleksandra Rachynska, Travis R. Rebstock, Conner L. Tordsen, and Andrew E. Sathoff

    PDF

    Research Aiming to Understand Baseline Cybersecurity Awareness for Senior Citizens and Their Training Needs, Malik A. Gladden

    PDF

    Research Poster, Ivan Casamalhuapa

    PDF

    RUFF: Resource Usage Fuzzing Framework, Gavin Black

    PDF

    Safeguarding Virtual Healthcare: A Novel Attacker-Centric Model for Data Security and Privacy, Suvineetha Herath, Haywood Gelman, John Hastings, and Yong Wang

    PDF

    Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs, Haywood Gelman and John Hastings

    PDF

    Science Fiction Media’s Influence on Public Perceptions of AI and Technology, Abbie Armstrong

    PDF

    Securing Modbus via Proxied Approach, Kyle Korman

    PDF

    Security through Neutrality? An analysis of net neutrality’s present position in cybersecurity, Jack Weekly

    PDF

    SETC: A Vulnerability Telemetry Collection Framework, Ryan Holeman, John Hastings, and Varghese Mathew Vaidyan

    PDF

    Setup and Design of GROWSTEM at DSU Year One Summary Report, Richard I. Avery, Tom Halverson, and Viki Johnson

    PDF

    Spatiotemporal Deep Learning for Land Cover and Impervious Surface Mapping with Satellite Imagery, Rylie Fleckenstein

    PDF

    Survey of IoT Users, Edward McGregor

    PDF

    SURVEY OF PRAIRIE LAKES FOR MICROPLASTICS IN EASTERN SOUTH DAKOTA, Vanessa Ocansey, Basbo Ayelazono, and Kristel K. Bakker

    PDF

    Switching Wearable Fitness Devices: Exploring Factors in Switching, Stephen Hendrix

    Link

    Systematic Analysis of Factors Influencing Modulith Architecture Adoption over Microservices, Chandra Prakash and Sunil Arora

    PDF

    Terror from the Skies?: Investigating the energetics and feeding ecology of one of the largest pterosaurs: Quetzalcoatlus northropi, Kierra Miller and T. Alexander Deccechi

    PDF

    Testing Quantum Computers for Functioning Quantum Hardware, Matthew Lenarz

    PDF

    The Art of Campaigning: Joint Planners Working at the Intersections of Everything, Mary Bell, Edgar M. Hollandsworth, Thomas J. Snukis, Jeffrey Turner, Luke P. Bellocchi, Nicholas Anthony, Steve Tribble, Chris Botterbusch, and Justin D. Harper

    PDF

    The Effect of Compilation on the Identification of Obfuscated Malware, Eli T. Fulkerson

    PDF

    The Impact of Organizational Culture on Artificial Intelligence (AI) and Organizational Performance: A Mixed Methods Approach, Wlifred C. Mutale

    PDF

    The Language of Influence: Sentiment, Emotion, and Hate Speech in State Sponsored Influence Operations, Khandaker Mamun Ahmed and Ashfaq Ali Shafin

    PDF

    The Psychological Impacts of Algorithmic and AI-Driven Social Media on Teenagers: A Call to Action, Sunil Arora, Sahil Arora, and John Hastings

    PDF

    The Role of Privacy in the Intention to Disclose Personal Driving Data Using Internet-of-Vehicle Technology in Consumer Automobiles, Steven Bradley Fowler

    PDF

    The Well-Being of a University: The Relationship Between Gratitude and Organizational Commitment on Faculty Members' Intention to Stay, Brenda Merkel, Kristi Bockorny, Amber Henderson, and Aaron Scholl

    PDF

    Toward an Insider Threat Education Platform: A Theoretical Literature Review, Haywood Gelman, John D. Hastings, David Kenley, and Eleanor Loiacono

    Link

    Toward extracting scattering phase shift from integrated correlation functions. III. Coupled channels, Peng Guo and Frank Lee

    Link

    Transforming Information Systems Management: A Reference Model for Digital Engineering Integration, john bonar and John Hastings

    PDF

    Transforming Information Systems Management: A Reference Model for Digital Engineering Integration, John Bonar and John Hastings

    PDF

    Using LLMs to Establish Implicit User Sentiment of Software Desirability, Sherri Weitl-Harms, John D. Hastings, and Jonah Lum

    PDF

    Using LLMs to Synthesize Product Desirability Datasets, John Hastings, Sherri Weitl-Harms, Joseph Doty, Zachary J. Myers, and Warren Thompson

    PDF

    Utilizing Large Language Models to Synthesize Product Desirability Datasets, John D. Hastings, Sherri Weitl-Harms, Joseph Doty, Zachary L. Myers, and Warren Thompson

    PDF

    Video Games: Do They Affect Adolescent and Teen Behaviors?, Kyle L. Wormstadt

 
 
 

Browse

  • Collections
  • Exhibits
  • Disciplines
  • Authors

Search

Advanced Search

  • Notify me via email or RSS

Author Corner

  • Author FAQ
  • Policies & Submission Guidelines
  • Submit Research
 
Elsevier - Digital Commons

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright